Sciweavers

5484 search results - page 1081 / 1097
» Almost-Everywhere Secure Computation
Sort
View
HPCC
2005
Springer
15 years 5 months ago
A SMS Based Ubiquitous Home Care System
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Tae-Seok Lee, Yuan Yang, Myong-Soon Park
MADNES
2005
Springer
15 years 5 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
OOPSLA
2005
Springer
15 years 5 months ago
Demand-driven points-to analysis for Java
We present a points-to analysis technique suitable for environments with small time and memory budgets, such as just-in-time (JIT) compilers and interactive development environmen...
Manu Sridharan, Denis Gopan, Lexin Shan, Rastislav...
OOPSLA
2005
Springer
15 years 5 months ago
Constructing a metacircular Virtual machine in an exploratory programming environment
Can virtual machine developers benefit from religiously observing the principles more often embraced for exploratory programming? To find out, we are concurrently constructing two...
David Ungar, Adam Spitz, Alex Ausch
OOPSLA
2005
Springer
15 years 5 months ago
Safe futures for Java
is a simple and elegant abstraction that allows concurrency to be expressed often through a relatively small rewrite of a sequential program. In the absence of side-effects, futur...
Adam Welc, Suresh Jagannathan, Antony L. Hosking
« Prev « First page 1081 / 1097 Last » Next »